seeing systems like these,
| though home brewed, in use for years. The availability of good tools as
| a foundation (things like Snort, the layer7 iptables patch, and so on)
| makes building decent layer 8 inference not far from trivial. Calling
| this piercing network anonymity in real time is highly
-- I've been seeing systems like these,
though home brewed, in use for years. The availability of good tools as
a foundation (things like Snort, the layer7 iptables patch, and so on)
makes building decent layer 8 inference not far from trivial. Calling
this piercing network anonymity in real time
Ivan Krstic [EMAIL PROTECTED] writes:
Calling this piercing network anonymity in real time is highly
misleading; in reality, it's more like making it bloody obvious
that there's no such thing as network anonymity.
No. Ever hear of Chaum's Dining Cryptographers [1]? Anonymity
right
[EMAIL PROTECTED] writes:
eTelemetry Locate [Image]
Locate dynamically discovers, correlates and archives the
person behind the IP address ...
Another reason to use StealthMail -- see package description below.
StealthMail still needs an